Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Size: px
Start display at page:

Download "Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media"

Transcription

1 Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA USA Copyright is held by the author/owner(s). CSCW 13 Measuring Networked Social Privacy Workshop, February 23 27, 2013, San Antonio, Texas, USA. Abstract Social media allows us to connect with our offline relationships in novel ways. However, Location-Sharing Social Media (LSS) has led to a host of privacy concerns. We identified one root driver of concerns found throughout the LSS literature: Boundary Preservation Concern (BPC). Namely, people want to maintain their existing relationship boundaries with others and inability to do so leads to privacy concerns. BPC lends empirical support to the Contextual Integrity (CI) framework, which pinpoints norm violations as the source of privacy issues. In this paper, we explore how CI can even provide guidance for new behaviors (e.g. location-sharing) where there is no offline equivalent or entrenched norm against which to judge privacy violations. In doing so, we highlight additional challenges for identifying relationship norms. We believe these issues may be relevant for other social media beyond locationsharing services. Author Keywords Privacy; Relationship Boundary Preservation; Contextual Integrity; Location-Sharing; Social Media

2 Contextual Integrity (CI) CI framework asserts that privacy violations happen when context-relative informational norms are broken. A Social Context consists of: Roles. Capacities in which people act (e.g. student) Activities. Practices in which people in roles engage (e.g. browse shelves at a store) Norms. Prescribe and proscribe acceptable actions, define relationship among roles (e.g. teachers teach curriculum, students listen) Values. Goals, purposes and ends (e.g. educational context transmits knowledge) For a given context, there are Informational Norms which have these parameters: Actors. Sender, recipient, subject of information. Attributes (info type). Kind and degree of knowledge. Transmission Principles. Constraints on flow of info. Ex: My doctor does not give my boss my medical history ACM Classification Keywords H.5.m. Information interfaces and presentation (e.g., HCI): Miscellaneous. Boundary Preservation The location-sharing and social media literature is filled with diverse privacy concerns such as informational, interactional, physical, or psychological privacy concerns. Researchers believe that this may explain the slow adoption of social location-sharing services such as Foursquare or Google Latitude [8]. This is despite the prevalence of smart phones [7] and the high use of location-aware services such as location-based search [9]. On the other hand, researchers have been puzzled by counterexamples to privacy concerns such as the large amount of information disclosed on social networks [1] that can pose social, emotional, or even physical threats (e.g. see PleaseRobMe.com). These seeming inconsistencies may be explained by conceptions of privacy as a boundary regulation [2, 6] where one may desire to be more open or closed. We further discovered that a motivation behind boundary regulation in location-sharing social media is Boundary Preservation, the desire to preserve one s offline relationship boundaries with others. Through grounded theory analysis (N=21) of interview data, and structural equation modeling of data from a survey administered nationwide (N=1532), we confirmed that Boundary Preservation Concern (BPC) is at the root of eight common privacy concerns in location-sharing and social media [4]. These concerns ranged from informational, interactional, psychological, to physical privacy concerns. People had higher privacy concerns if they thought that using LSS would redefine their offline relationships with others. For example, one interviewee explained how she did not want to use social media with her family for this reason: I don t tell them what I do every day and I never have. We just don t have that type of relationship, even though it s very close. That s how I d want it online as well. On the flip side, when interviewees expected that LSS would not affect their offline relationships, they were not privacy concerned. This was especially striking in attitudes towards strangers. Many interviewees were not privacy concerned about strangers knowing their location because they did not expect a change to how they would relate to them: You won t just go and talk to anyone Even if you broadcast your location, your name, that doesn t mean everyone will come and talk to you. Applying the CI Framework Turning to the framework of Contextual Integrity [3], we draw on it to help us to understand when boundary preservation concerns are likely to abound. The framework states that for any given social context (offline or online), there are informational norms defining appropriate flows for various types of information (see sidebar for overview). Privacy violations result when these norms are broken. Privacy issues introduced by information technologies are often the result of them changing the expected informational flow in a given social context. For example, one would expect to discuss medical information with one s doctor, and salary with one s boss, but not vice versa. This social context (e.g. medical and work, respectively) holds whether the interaction takes place on or offline. A technology that shared personal health information in a work context may be deemed problematic, but in a medical context may be fine. This example highlights the importance of social context for predicting whether sharing something is a privacy concern. Context allows

3 Privacy Break-down Points In new social media, the social context is not always clear. Thus, an appropriate action in the eyes of one person may appear to be a privacy intrusion to another. We found a number of situations that can lead to these incongruent perceptions of privacy infringement: Unknown Context. People may be worried about how to behave when they are not sure why they are sharing their location. Conflicting Context. People may understand the value of using LSS differently. Ex. One person may feel that they should be able to meet up with others (unannounced) while another feels it is just for keeping in touch. Inferred Context. People may infer that because someone is sharing their location, a different social context must apply. This can lead to their redefining their own and others role to match the new context. us to know the norms and so evaluate whether they are being violated. However, for new social technology, context is not always fully defined. Here we expand on the CI framework it in order to explain why privacy concerns also arise in an ambiguous LSS context (see sidebar for summary): Conflicting Context. For location-sharing social media, the values of the social context, at a high level, consist of maintaining and enhancing one s personal relationships through sharing location. However, our study finds that people interpret these values differently and thus diverge in what they consider appropriate activities and norms associated with using LSS [5]. This may be because it was and still is a relatively new technology. Some see it as a way to meet up with others (unannounced). Others perceive LSS as a way to keep in touch. Still others use it as an indicator of availability. Because people interpret the values differently, they also do not agree upon the norms and consequently the informational norms. Norms that support dropping in on people are different from ones that support keeping informed. For example, sharing location continuously and in real-time may help someone meet up with people, but is less suited to keeping in touch. This could explain why some of the interviewees feel bombarded with more information than necessary for keeping in touch, and regard those who constantly shared location as inconsiderate. On the flip side, other interviewees complained about bad LSS users who do not share enough location information to be able to locate them in real time. Few interviewees recognized that others are operating from a different social context. Those who did were concerned about acting on conflicting informational norms. Conversely, those interviewees who do not expect others to have different social context and norms, or who otherwise do not expect a violation of information flow, were often not privacy concerned. Unknown Context. Some people had no idea of the social context and what the norms could be. They avoided using LSS because they didn t want to do anything weird. They do not want to bother others, offend someone, or otherwise call into question the relationship. Their boundary preservation concerns center on not knowing where the boundaries should be. Inferred Context. Norm-breaking concerns are also problematic in another way. Interviewees worried that the information flows would actually dictate the roles and relationship between themselves and the person with whom they are sharing. For example, one interviewee believed that sharing real-time location with someone she is dating would have implied to him they had progressed to a relationship phase where a large amount of mutual awareness is appropriate. This would change the existing relationship boundary and thus be a privacy concern. These types of concerns occurred less often when relationships were well defined (e.g. spouse) and less likely to be called into question. One aspect needing further study in all of these scenarios is the reach of a given norm. The CI framework references existing, commonly accepted norms for a given social context. However, our studies indicate that the sphere of people upholding a given norm may be as small as a pair of specific persons; The type of relationship one man has with his mother is different from the relationship another man has with his own mother and demands different norms around

4 information flow. What needs further investigation is whether there may be more generalizable categories of relationships (e.g. Constantly sharing my status with type mom, vs. Don t keep tabs type mom) that can be used to create a finite set of relationship types and norms. This would enable us to evaluate norm violations more generally than going on a case-by-case basis. Furthermore, research is needed to understand how differences in norm perception arise from situational factors versus individual disposition. For example, we noticed that some individuals confidently hypothesized social contexts for various new technologies while others seem to approach new technologies as a blank slate with no presumption of social context. Dispositional influences would mean that a given type of individual is more likely to experience a certain type of privacy breakdown. Situational factors such as exposure to existing users may be mitigated with technology design. Conclusion We showed how the Contextual Integrity framework can be applied to location-sharing social media to identify sources of privacy concern, even when the social context is not well established. Drawing on CI, we are able to point out how an ambiguous social context can lead to privacy concerns. We are actively working on follow-up studies to probe whether we can design technology to disambiguate social context and norms and consequently alleviate privacy concerns. Services that more explicitly identify roles and social context (e.g. LinkedIn asks members to specify their relationship to others for networking purposes) may pose fewer boundary preservation concerns than more open-ended technologies (e.g. Facebook) used for many activities and goals. Boundary preservation of offline relationships proves to be one significant driver of privacy concerns in locationsharing social media. This may be because locationsharing integrates offline directly with online presence. Nonetheless, our data points to boundary preservation concerns in many other social media such as Facebook and Twitter, which also often tie online relationships to offline ones. Insights from this work can shed light on why people may have privacy concerns towards new behaviors enabled by various social media. We note that while boundary preservation and privacy concerns do have a significant impact on frequency of use and non adoption, other factors (e.g. utility, communication style and other predispositions) also come into play. We are actively investigating the relative impact of these other factors in comparison to privacy concerns.

5 Acknowledgements I d like to thank Alfred Kobsa and Bart Knijnenburg for their part in conducting this research, as well as all the anonymous reviewers for their feedback. References [1] Acquisti, A. and Gross, R Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies [2] Altman, I The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company. [3] Nissenbaum, H.F Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press. [4] Page, X. et al Don t Disturb My Circles! Boundary Preservation Is at the Center of Location- Sharing Concerns. Proc. ICWSM 12. [5] Page, X. and Kobsa, A Navigating the Social Terrain with Google Latitude. Proc. iconference'10. [6] Palen, L. and Dourish, P Unpacking Privacy for a Networked World. Proc. CHI'03, [7] Smith, A Nearly half of American adults are smartphone owners. Pew Internet & American Life Project. [8] Tsai, J.Y. et al Location-Sharing Technologies: Privacy Risks and Controls. I/S: A Journal of Law and Policy for the Information Society. [9] Zickuhr, K Three-quarters of smartphone owners use location-based services. Pew Internet & American Life Project.

Understanding Privacy Decision- Making Using Social Exchange Theory

Understanding Privacy Decision- Making Using Social Exchange Theory Understanding Privacy Decision- Making Using Social Exchange Theory Jennifer King University of California Berkeley School of Information 102 South Hall Berkeley, CA 94720-4600 jenking@ischool.berkeley.edu

More information

Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf

Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf Culturally Sensitive Design for Privacy: A case study of the Arabian Gulf Norah Abokhodair The Information School University of Washington Seattle, WA, USA noraha@uw.edu norahak.wordpress.com Paste the

More information

A comprehensive guide to digital badges.

A comprehensive guide to digital badges. A comprehensive guide to digital badges. This is your in-depth guide to what digital badges are and how they are used. A FREE RESOURCE FROM ACCREDIBLE.COM A Comprehensive Guide to Digital Badges 2 Introduction

More information

CILIP Privacy Briefing 2017

CILIP Privacy Briefing 2017 CILIP Privacy Briefing 2017 Tuesday 28 November 2017 #CILIPPrivacy17 Privacy, surveillance and the information profession: challenges, qualifications, and dilemmas? David McMenemy, Lecturer and Course

More information

Online Disclosure. Natalya N. Bazarova

Online Disclosure. Natalya N. Bazarova Online Disclosure Natalya N. Bazarova Bazarova, N. N. (2015). Online disclosure. In C. R. Berger & M. E. Roloff (Eds.), The International Encyclopedia of Interpersonal Communication. Hoboken, NJ: Wiley-Blackwell.

More information

How to prepare for a job interview: easy tips and questions to think about

How to prepare for a job interview: easy tips and questions to think about Page 1 of 10 How to prepare for a job interview: easy tips and questions to think about Before the Interview: RESEARCH THE ORGANIZATION: READ Press releases Other news about the organization Websites Publications

More information

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT

Jun Zhang 1 School of Management, University of Science and Technology of China Hefei, Anhui, China ABSTRACT Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary Chuang Wang School of Business Administration, South China University of Technology Guangzhou, Guangdong, China Jun

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

Open Research Online The Open University s repository of research publications and other research outputs

Open Research Online The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs Evaluating User Engagement Theory Conference or Workshop Item How to cite: Hart, Jennefer; Sutcliffe,

More information

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM

More information

LISTEN A MINUTE.com. Advice. One minute a day is all you need to improve your listening skills.

LISTEN A MINUTE.com. Advice.   One minute a day is all you need to improve your listening skills. LISTEN A MINUTE.com Advice http://www.listenaminute.com/a/advice.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short text.

More information

IMSIG. Lessons from the Trenches - Realities and Challenges of an Interim. Sarah Bolsover Celia Adams IMSIG. icaew.com

IMSIG. Lessons from the Trenches - Realities and Challenges of an Interim. Sarah Bolsover Celia Adams IMSIG. icaew.com Lessons from the Trenches - Realities and Challenges of an Interim Sarah Bolsover Celia Adams Our Experiences Your Feedback Are you suited to being an interim? Key considerations Ask the audience What

More information

Executive Summary. The process. Intended use

Executive Summary. The process. Intended use ASIS Scouting the Future Summary: Terror attacks, data breaches, ransomware there is constant need for security, but the form it takes is evolving in the face of new technological capabilities and social

More information

What is Networking? and (drumroll) the answer is C

What is Networking? and (drumroll) the answer is C What is Networking? This is a test: a) Asking someone you know for a job b) Using people you know to get your foot in the door c) Talking to people d) Being nice to people so they will help you out and

More information

Introduction. Data Source

Introduction. Data Source Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the

More information

Balancing Privacy and Awareness in Home Media Spaces 1

Balancing Privacy and Awareness in Home Media Spaces 1 Balancing Privacy and Awareness in Home Media Spaces 1 Carman Neustaedter & Saul Greenberg University of Calgary Department of Computer Science Calgary, AB, T2N 1N4 Canada +1 403 220-9501 [carman or saul]@cpsc.ucalgary.ca

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ H. Nissenbaum Privacy as Contextual Integrity (Washington Law Review 2004) Common-Law Right

More information

Taking an Ethnography of Bodily Experiences into Design analytical and methodological challenges

Taking an Ethnography of Bodily Experiences into Design analytical and methodological challenges Taking an Ethnography of Bodily Experiences into Design analytical and methodological challenges Jakob Tholander Tove Jaensson MobileLife Centre MobileLife Centre Stockholm University Stockholm University

More information

Contextual Integrity through the lens of computer science

Contextual Integrity through the lens of computer science Contextual Integrity through the lens of computer science Sebastian Benthall Seda Gürses Helen Nissenbaum A presentation of S. Benthall, S. Gürses and H. Nissenbaum. Contextual Integrity through the Lens

More information

Day TWO: Find & Follow Building Your Community

Day TWO: Find & Follow Building Your Community Day TWO: Find & Follow Building Your Community The small print: All this material, whilst given freely for this course, is for your use only, and not for dissemination to anyone else, even inside your

More information

The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley

The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley Introduction Social media is composed of networks of online communication

More information

Squishy Circuits as a Tangible Interface

Squishy Circuits as a Tangible Interface Squishy Circuits as a Tangible Interface Matthew Schmidtbauer schm8986@stthomas.edu Samuel Johnson john7491@stthomas.edu Jeffrey Jalkio jajalkio@stthomas.edu AnnMarie Thomas apthomas@stthomas.edu Abstract

More information

Managing your netrep A Roevin recruitment guide

Managing your netrep A Roevin recruitment guide Managing your netrep Page 1 of 7 Managing your netrep Are you Facebooked? Is your face on MySpace? What about LinkedIn? Do you tweet? Have you posted a comment on a company s website or news page? Is your

More information

I'd Sit at Home and Do Work s : How Tablets Affect the Work-Life Balance of Office Workers

I'd Sit at Home and Do Work  s : How Tablets Affect the Work-Life Balance of Office Workers I'd Sit at Home and Do Work Emails : How Tablets Affect the Work-Life Balance of Office Workers Katarzyna Stawarz katarzyna.stawarz.10@ucl.ac.uk Anna L Cox anna.cox@ucl.ac.uk Jon Bird jon.bird@ucl.ac.uk

More information

Inside the black-box. children rights in the digital age. Conceição Costa José Rogado Carla Sousa Sara Henriques

Inside the black-box. children rights in the digital age. Conceição Costa José Rogado Carla Sousa Sara Henriques Inside the black-box children rights in the digital age Conceição Costa José Rogado Carla Sousa Sara Henriques Children Rights in the Digital Age The United Nations Convention on the Rights of the Child

More information

Sense and Sensibility in a Pervasive World

Sense and Sensibility in a Pervasive World Sense and Sensibility in a Pervasive World Christos Efstratiou 1, Ilias Leontiadis 1, Marco Picone 1,2, Kiran K. Rachuri 1, Cecilia Mascolo 1, and Jon Crowcroft 1 1 Computer Laboratory, University of Cambridge,

More information

Northfleet Technology College Course Outline: Information Technology in a Global Society

Northfleet Technology College Course Outline: Information Technology in a Global Society Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers

More information

Negotiating technology use to make vacations special Heather Kennedy-Eden a Ulrike Gretzel a Nina Mistilis b

Negotiating technology use to make vacations special Heather Kennedy-Eden a Ulrike Gretzel a Nina Mistilis b Negotiating technology use to make vacations special Heather Kennedy-Eden a Ulrike Gretzel a Nina Mistilis b a Department of Marketing & Management University of Wollongong hkeden@uow.edu.au ugretzel@uow.edu.au

More information

THE INTEGRATION OF NEW MEDIA LITERACY AND THE RIGHTS OF THE CHILDAT THE DIGITAL MEDIA INTO THE CURRICULUM

THE INTEGRATION OF NEW MEDIA LITERACY AND THE RIGHTS OF THE CHILDAT THE DIGITAL MEDIA INTO THE CURRICULUM THE INTEGRATION OF NEW MEDIA LITERACY AND THE RIGHTS OF THE CHILDAT THE DIGITAL MEDIA INTO THE CURRICULUM Asst.Prof.Dr. Duygu AYDIN / Selcuk University Betül KARAOSMANOĞLU / Pamukkale University DIGITAL

More information

UFYB 53: Listener Q & A Vol. 5

UFYB 53: Listener Q & A Vol. 5 Full Episode Transcript With Your Host Kara Loewentheil Welcome to Unf*ck Your Brain, the only podcast that teaches you how to use psychology, feminism, and coaching, to rewire your brain and get what

More information

LISTEN A MINUTE.com. Dreams. One minute a day is all you need to improve your listening skills.

LISTEN A MINUTE.com. Dreams.  One minute a day is all you need to improve your listening skills. LISTEN A MINUTE.com Dreams http://www.listenaminute.com/d/dreams.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short text.

More information

Using smartphones for crowdsourcing research

Using smartphones for crowdsourcing research Using smartphones for crowdsourcing research Prof. Vassilis Kostakos School of Computing and Information Systems University of Melbourne 13 July 2017 Talk given at the ACM Summer School on Crowdsourcing

More information

First approaches to qualitative data analysis. I214 9 Oct 2008

First approaches to qualitative data analysis. I214 9 Oct 2008 First approaches to qualitative data analysis I214 9 Oct 2008 Recap: Collecting (mostly qualitative) data Observation Field notes: your own notes on what you see and think Video, photography Interviews

More information

Inequality as difference: A teaching note on the Gini coefficient

Inequality as difference: A teaching note on the Gini coefficient Inequality as difference: A teaching note on the Gini coefficient Samuel Bowles Wendy Carlin SFI WORKING PAPER: 07-0-003 SFI Working Papers contain accounts of scienti5ic work of the author(s) and do not

More information

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009 MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers

More information

TIPS FOR COMMUNICATING WITH CRIME VICTIMS

TIPS FOR COMMUNICATING WITH CRIME VICTIMS TIPS FOR COMMUNICATING WITH CRIME VICTIMS MATERIALS PRINTED FROM JUSTICE SOLUTIONS WEBSITE 2015 Good things to say to victims: How can I help you? What can I do for you? I m sorry. What happened is not

More information

Personal tracking and everyday relationships: Reflections on three prior studies

Personal tracking and everyday relationships: Reflections on three prior studies Personal tracking and everyday relationships: Reflections on three prior studies John Rooksby School of Computing Science University of Glasgow Scotland, UK. John.rooksby@glasgow.ac.uk Abstract This paper

More information

Sponsoring With Integrity -

Sponsoring With Integrity - Sponsoring With Integrity - How to Attract and Recruit Serious Business Builders to Your Network Marketing Team 6 Month Coaching Program Class Two - Relating Relating - Get People Hungry to Hear About

More information

Issues and Challenges in Coupling Tropos with User-Centred Design

Issues and Challenges in Coupling Tropos with User-Centred Design Issues and Challenges in Coupling Tropos with User-Centred Design L. Sabatucci, C. Leonardi, A. Susi, and M. Zancanaro Fondazione Bruno Kessler - IRST CIT sabatucci,cleonardi,susi,zancana@fbk.eu Abstract.

More information

6 Sources of Acting Career Information

6 Sources of Acting Career Information 6 Sources of Acting Career Information 1 The 6 Sources of Acting Career Information Unfortunately at times it can seem like some actors don't want to share with you what they have done to get an agent

More information

Home-Care Technology for Independent Living

Home-Care Technology for Independent Living Independent LifeStyle Assistant Home-Care Technology for Independent Living A NIST Advanced Technology Program Wende Dewing, PhD Human-Centered Systems Information and Decision Technologies Honeywell Laboratories

More information

SAMPLE SCRIPTS FOR INVITING

SAMPLE SCRIPTS FOR INVITING SAMPLE SCRIPTS FOR INVITING If you feel at a loss for words when you send an invite, or you want a simple go-to script ready so you don t miss out on an inviting opportunity, then review this script tool

More information

The Mediated Action Sheets: Structuring the Fuzzy Front-End of UX

The Mediated Action Sheets: Structuring the Fuzzy Front-End of UX The Mediated Action Sheets: Structuring the Fuzzy Front-End of UX Mattias Arvola SICS East Swedish ICT AB Department of Computer and Information Science Linköping University SE-58381 Linköping, Sweden

More information

When in Rome: The Role of Culture & Context in Adherence to Robot Recommendations

When in Rome: The Role of Culture & Context in Adherence to Robot Recommendations When in Rome: The Role of Culture & Context in Adherence to Robot Recommendations Lin Wang & Pei- Luen (Patrick) Rau Benjamin Robinson & Pamela Hinds Vanessa Evers Funded by grants from the Specialized

More information

7 Ways to Build your Online Presence Now

7 Ways to Build your Online Presence Now 7 Ways to Build your Online Presence Now BY WORLD RENOWNED FIRESTARTER JOHN LEE DUMAS Created for atomic ONLINE MARKETING 7 Ways to Build your Online Presence Now Introduction If you ve just started your

More information

How to Gain and Retain Clients

How to Gain and Retain Clients How to Gain and Retain Clients http://buildingbridgesforbusiness.org Congratulations! You have completed the first steps to owning your own business. You have the necessary licenses required by your state

More information

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons www.breaking News English.com Ready-to-use ESL / EFL Lessons 1,000 IDEAS & ACTIVITIES FOR LANGUAGE TEACHERS The Breaking News English.com Resource Book http://www.breakingnewsenglish.com/book.html Facebook

More information

LISTEN A MINUTE.com. First Impressions.

LISTEN A MINUTE.com. First Impressions. LISTEN A MINUTE.com First Impressions http://www.listenaminute.com/f/first_impressions.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation

More information

My Earnings from PeoplePerHour:

My Earnings from PeoplePerHour: Hey students and everyone reading this post, since most of the readers of this blog are students, that s why I may call students throughout this post. Hope you re doing well with your educational activities,

More information

Katy Young s Guide to... LinkedIn

Katy Young s Guide to... LinkedIn 21/08/13 Step by step guide followed by advanced techniques guide INTRODUCTION LinkedIn works like an online address book and personalised CV. People approach LinkedIn with different objectives. At the

More information

Circle Link 1 Online Rules of the Road

Circle Link 1   Online Rules of the Road 4 th Grade Scavenger Hunt Links Content Circle Link 1 http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb Online Rules of the Road 1. Guard your privacy. What people know about you is up to

More information

Our Digital Future: An Interview with the UM Dean of School of Information

Our Digital Future: An Interview with the UM Dean of School of Information University of Michigan Deep Blue deepblue.lib.umich.edu 2011-01 Our Digital Future: An Interview with the UM Dean of School of Information MacKie-Mason, Jeffrey K.; Peters, Allison; Wang, Julia; Zhang,

More information

Verus. Khalid Alqinyah, Muhsin Gurel, Michael Mullen, Richard Tran, Phil Weber

Verus. Khalid Alqinyah, Muhsin Gurel, Michael Mullen, Richard Tran, Phil Weber Verus Khalid Alqinyah, Muhsin Gurel, Michael Mullen, Richard Tran, Phil Weber Schizophrenia A life long mental disorder involving a breakdown in relation between thought and emotion that leads to a faulty

More information

PROJECT FACT SHEET GREEK-GERMANY CO-FUNDED PROJECT. project proposal to the funding measure

PROJECT FACT SHEET GREEK-GERMANY CO-FUNDED PROJECT. project proposal to the funding measure PROJECT FACT SHEET GREEK-GERMANY CO-FUNDED PROJECT project proposal to the funding measure Greek-German Bilateral Research and Innovation Cooperation Project acronym: SIT4Energy Smart IT for Energy Efficiency

More information

Social Network Behaviours to Explain the Spread of Online Game

Social Network Behaviours to Explain the Spread of Online Game Social Network Behaviours to Explain the Spread of Online Game 91 Marilou O. Espina orcid.org/0000-0002-4727-6798 ms0940067@yahoo.com Bukidnon State University Jovelin M. Lapates orcid.org/0000-0002-4233-4143

More information

LISTEN A MINUTE.com. Old Age. Focus on new words, grammar and pronunciation in this short text.

LISTEN A MINUTE.com. Old Age.  Focus on new words, grammar and pronunciation in this short text. LISTEN A MINUTE.com Old Age http://www.listenaminute.com/o/old_age.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short text.

More information

Why do we worry? Why not just ask??? Escalating the Interview: Being Mindful of the Slippery Slope 11/2/2011

Why do we worry? Why not just ask??? Escalating the Interview: Being Mindful of the Slippery Slope 11/2/2011 Escalating the Interview: Being Mindful of the Slippery Slope Julie Kenniston, MSW, LSW Why do we worry? Impression of being leading or suggestive Might move child too quickly or scare child off Team thinks

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

TABLE OF CONTENTS TOPIC AND THEME RESEARCHING THESIS CRAFTING AND ANALYSIS SHOW WHAT YOU KNOW FINAL TIPS

TABLE OF CONTENTS TOPIC AND THEME RESEARCHING THESIS CRAFTING AND ANALYSIS SHOW WHAT YOU KNOW FINAL TIPS WELCOME TO THE NHD in WI STUDENT GUIDE Starting an NHD project? Read this guide to help you get going! This will take you through each step in your NHD journey. If you are stuck with something specific,

More information

Write a Short Story. Short Story Unit Overview:

Write a Short Story. Short Story Unit Overview: Write a Short Story Subject: Prep Advanced Writing Short Story Unit Overview In this unit, you will examine the craft of using language, the literary devices that authors use, and discover how these can

More information

I ve made a new friend online. But I m worried. What do I do?

I ve made a new friend online. But I m worried. What do I do? I ve made a new friend online. But I m worried. What do I do? Read this booklet with someone who supports you. You don t need to read it all at once. Are you worried about who you are talking to online?

More information

Resource Review. In press 2018, the Journal of the Medical Library Association

Resource Review. In press 2018, the Journal of the Medical Library Association 1 Resource Review. In press 2018, the Journal of the Medical Library Association Cabell's Scholarly Analytics, Cabell Publishing, Inc., Beaumont, Texas, http://cabells.com/, institutional licensing only,

More information

RepliPRI: Challenges in Replicating Studies of Online Privacy

RepliPRI: Challenges in Replicating Studies of Online Privacy RepliPRI: Challenges in Replicating Studies of Online Privacy Sameer Patil Helsinki Institute for Information Technology HIIT Aalto University Aalto 00076, FInland sameer.patil@hiit.fi Abstract Replication

More information

LISTEN A MINUTE.com. Focus on new words, grammar and pronunciation in this short text.

LISTEN A MINUTE.com.   Focus on new words, grammar and pronunciation in this short text. LISTEN A MINUTE.com OK http://www.listenaminute.com/o/ok.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short text. Doing

More information

There have never been more ways to communicate with one another than there are right now.

There have never been more ways to communicate with one another than there are right now. Personal Connections in a Digital Age by Catherine Gebhardt There have never been more ways to communicate with one another than there are right now. However, the plentiful variety of communication tactics

More information

A social networking-based approach to information management in construction

A social networking-based approach to information management in construction 175 A social networking-based approach to information management in construction Michael HENRY* and Yoshitaka KATO** Successful project completion in the construction industry requires careful and timely

More information

Personalized Privacy Assistant to Protect People s Privacy in Smart Home Environment

Personalized Privacy Assistant to Protect People s Privacy in Smart Home Environment Personalized Privacy Assistant to Protect People s Privacy in Smart Home Environment Yaxing Yao Syracuse University Syracuse, NY 13210, USA yyao08@syr.edu Abstract The goal of this position paper is to

More information

TOP 10 INTERVIEWING TIPS

TOP 10 INTERVIEWING TIPS TOP 10 INTERVIEWING TIPS ONE Research the organisation! SIX Use positive body language and be sure to make eye contact when answering questions. TWO Prepare answers to common interview questions. SEVEN

More information

Climate Asia Research Overview

Climate Asia Research Overview Climate Asia Research Overview Regional research study: comparable across seven countries The Climate Asia research was conducted in seven countries: Bangladesh, China, India, Indonesia, Nepal, Pakistan

More information

Rubber Hand. Joyce Ma. July 2006

Rubber Hand. Joyce Ma. July 2006 Rubber Hand Joyce Ma July 2006 Keywords: 1 Mind - Formative Rubber Hand Joyce Ma July 2006 PURPOSE Rubber Hand is an exhibit prototype that

More information

QS Spiral: Visualizing Periodic Quantified Self Data

QS Spiral: Visualizing Periodic Quantified Self Data Downloaded from orbit.dtu.dk on: May 12, 2018 QS Spiral: Visualizing Periodic Quantified Self Data Larsen, Jakob Eg; Cuttone, Andrea; Jørgensen, Sune Lehmann Published in: Proceedings of CHI 2013 Workshop

More information

Rethink the Way you Market Your SaaS Product. Wesley Bush

Rethink the Way you Market Your SaaS Product. Wesley Bush Rethink the Way you Market Your SaaS Product. Wesley Bush What s in it For You? 1. 2. 3. 4. 5. Learn the three main reasons why people buy products Understand how to do switch interviews like a pro The

More information

Integrity Constraints in Trust Management

Integrity Constraints in Trust Management Integrity Constraints in Trust Management Sandro Etalle University of Twente now (2007) visiting the University of Trento William H. Winsborough University of Texas S. Antonio Plan of the talk Trust Management

More information

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES K.P Jayant, Research Scholar JJT University Rajasthan ABSTRACT It has made the world a smaller place and has opened up previously inaccessible markets

More information

5 False Beliefs That Hurt Client Retention for Hair Salons

5 False Beliefs That Hurt Client Retention for Hair Salons 5 False Beliefs That Hurt Client Retention for Hair Salons Having a sound client retention strategy is critical to sustain both service and retail sales for your salon. Your strategy should center on delighting

More information

DIMACS/PORTIA Workshop on Privacy Preserving

DIMACS/PORTIA Workshop on Privacy Preserving DIMACS/PORTIA Workshop on Privacy Preserving Data Mining Data Mining & Information Privacy: New Problems and the Search for Solutions March 15 th, 2004 Tal Zarsky The Information Society Project, Yale

More information

LISTEN A MINUTE.com. Vitamins. Focus on new words, grammar and pronunciation in this short text.

LISTEN A MINUTE.com. Vitamins.   Focus on new words, grammar and pronunciation in this short text. LISTEN A MINUTE.com Vitamins http://www.listenaminute.com/v/vitamins.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short

More information

How to Start a Blog & Use It To Squash Writer s Block

How to Start a Blog & Use It To Squash Writer s Block How to Start a Blog & Use It To Squash Writer s Block by Robert Lee Brewer In these days of publishing and media change, writers have to build platforms and learn how to connect to audiences if they want

More information

Candidate Interview Preparation

Candidate Interview Preparation Candidate Interview Preparation A little preparation before the interview will help take the edge off the event. Here are some simple ways to get ready for your meeting. 1. Research the company and learn

More information

Online identity. Introduction. Ilire Zajmi Rugova

Online identity. Introduction. Ilire Zajmi Rugova Ilire Zajmi Rugova Abstract Social media have become an arena of rapid dissemination of information, global communication, self - promotion, freedom of expression, but also hot debates and powerful tool

More information

LISTEN A MINUTE.com. Culture. One minute a day is all you need to improve your listening skills.

LISTEN A MINUTE.com. Culture.   One minute a day is all you need to improve your listening skills. LISTEN A MINUTE.com Culture http://www.listenaminute.com/c/culture.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short text.

More information

BUILDING COMMUNITY CONNECTIONS: DESIGNING A FUTURE THAT WORKS.

BUILDING COMMUNITY CONNECTIONS: DESIGNING A FUTURE THAT WORKS. BUILDING COMMUNITY CONNECTIONS: DESIGNING A FUTURE THAT WORKS. Cecilia Gandolfo Kristin Fichera CECILIA GANDOLFO: I work at the Institute for Community Inclusion. Basically what we do is focus on the issue

More information

Call for Chapters for RESOLVE Network Edited Volume

Call for Chapters for RESOLVE Network Edited Volume INSIGHT INTO VIOLENT EXTREMISM AROUND THE WORLD Call for Chapters for RESOLVE Network Edited Volume Title: Researching Violent Extremism: Context, Ethics, and Methodologies The RESOLVE Network Secretariat

More information

A paradox for supertask decision makers

A paradox for supertask decision makers A paradox for supertask decision makers Andrew Bacon January 25, 2010 Abstract I consider two puzzles in which an agent undergoes a sequence of decision problems. In both cases it is possible to respond

More information

LISTEN A MINUTE.com. Eating. One minute a day is all you need to improve your listening skills.

LISTEN A MINUTE.com. Eating.   One minute a day is all you need to improve your listening skills. LISTEN A MINUTE.com Eating http://www.listenaminute.com/e/eating.html One minute a day is all you need to improve your listening skills. Focus on new words, grammar and pronunciation in this short text.

More information

Understanding User s Experiences: Evaluation of Digital Libraries. Ann Blandford University College London

Understanding User s Experiences: Evaluation of Digital Libraries. Ann Blandford University College London Understanding User s Experiences: Evaluation of Digital Libraries Ann Blandford University College London Overview Background Some desiderata for DLs Some approaches to evaluation Quantitative Qualitative

More information

Statistical Methods in Computer Science

Statistical Methods in Computer Science Statistical Methods in Computer Science Experiment Design Gal A. Kaminka galk@cs.biu.ac.il Experimental Lifecycle Vague idea groping around experiences Initial observations Model/Theory Data, analysis,

More information

Amigo Approach Towards Perceived Privacy

Amigo Approach Towards Perceived Privacy Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy,

More information

VIP Power Conversations, Power Questions Hi, it s A.J. and welcome VIP member and this is a surprise bonus training just for you, my VIP member. I m so excited that you are a VIP member. I m excited that

More information

ACTIVE LISTENING SKILLS. 1. Nonverbal skills: eye contact, open body posture, nodding head

ACTIVE LISTENING SKILLS. 1. Nonverbal skills: eye contact, open body posture, nodding head MARY BONCHER HAND- OUTS a guide to the brain attachment on computer. Active Listening Workshop ACTIVE LISTENING SKILLS 1. Nonverbal skills: eye contact, open body posture, nodding head 2. Minimal encouragers

More information

WONDER by R.J.Palacio Reading Guide

WONDER by R.J.Palacio Reading Guide WONDER by R.J.Palacio Reading Guide Student s Name: Class: 1 Wonder Before Reading What do you think of the line don t judge a boy by his face, that appears on the back cover? Pages 1-26 1) Why does August

More information

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport

10 Ways To Be More Assertive In Your Relationships By Barrie Davenport 10 Ways To Be More Assertive In Your Relationships By Barrie Davenport Anna hates to rock the boat. Whenever her best friend Linda suggests a place for dinner or a movie they might see together, Anna never

More information

The communication dimension of wind energy: Challenges and opportunities

The communication dimension of wind energy: Challenges and opportunities The communication dimension of wind energy: Challenges and opportunities OPPORTUNITIES 1. Pew Research Center for the People and the Press, 2009 2. Pew Research Center for the People and the Press, 2009

More information

Using colorful light-emitting diodes to engage students in the study of electric circuits L E DS. Christopher Johnstone.

Using colorful light-emitting diodes to engage students in the study of electric circuits L E DS. Christopher Johnstone. Using colorful light-emitting diodes to engage students in the study of electric circuits L E DS Christopher Johnstone February 2014 27 When learning about electricity, students are typically asked to

More information

Building a Village With Safety Networks

Building a Village With Safety Networks 2018 Wisconsin Public Child Welfare Conference Building a Village With Safety Networks The adage, It takes a village to raise a child, is so well known because of its inherent truth that everyone needs

More information

Effective networking. ACA training webinar by Bob Griffiths, RGA services 20 September 2011 BUSINESS WITH CONFIDENCE. icaew.com

Effective networking. ACA training webinar by Bob Griffiths, RGA services 20 September 2011 BUSINESS WITH CONFIDENCE. icaew.com Effective networking ACA training webinar by Bob Griffiths, RGA services 20 September 2011 Bob Griffiths ICAEW Chartered Accountant Over 20 years experience as a personal and business coach Proven track

More information

All submissions are read anonymously and every writer gets a submission feedback report.

All submissions are read anonymously and every writer gets a submission feedback report. All submissions are read anonymously and every writer gets a submission feedback report. Please Note: We now only accept entries submitted electronically through our Application Form. 1. DATES AND DEADLINES

More information

For more information about how to cite these materials visit

For more information about how to cite these materials visit Author(s): Paul Conway, PhD, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution Share Alike 3.0 License: http://creativecommons.org/licenses/by-sa/3.0/

More information

Behavior Analysis and Eco feedback. Angela Sanguinetti, PhD, BCBA UC Davis cenergi.ucdavis.edu

Behavior Analysis and Eco feedback. Angela Sanguinetti, PhD, BCBA UC Davis cenergi.ucdavis.edu Behavior Analysis and Eco feedback Angela Sanguinetti, PhD, BCBA UC Davis cenergi.ucdavis.edu This talk My background: How I got to the other side Introduction to eco feedback Behavior analysis and eco

More information

Interactions and Applications for See- Through interfaces: Industrial application examples

Interactions and Applications for See- Through interfaces: Industrial application examples Interactions and Applications for See- Through interfaces: Industrial application examples Markus Wallmyr Maximatecc Fyrisborgsgatan 4 754 50 Uppsala, SWEDEN Markus.wallmyr@maximatecc.com Abstract Could

More information